project
project
SUBMITTED BY
Zohaid Akhtar
REG NO: 65224
SUBMITTED TO
Dr. Faisal Tufail
Date: 11 November 2024
1
TABLE OF CONTENTS
LIST OF FIGURE.........................................................................................................................3
LIST OF TABLE...........................................................................................................................4
ACKNOWLEDGEMENT............................................................................................................5
Abstract..........................................................................................................................................6
Chapter 1: Introduction................................................................................................................7
1.1 LASER System.....................................................................................................................8
1.2 Circuit and working.............................................................................................................8
Chapter 2: Literature review......................................................................................................10
Chapter 3: Methodology.............................................................................................................12
Chapter 4: Results.......................................................................................................................15
Chapter 5: Discussion..................................................................................................................17
Chapter 6: CONCLUSIONS......................................................................................................20
Chapter 7: References.................................................................................................................21
2
LIST OF FIGURE
3
LIST OF TABLE
4
ACKNOWLEDGEMENT
It would not have been possible for me to accomplish this dissertation without the blessings of
Allah, creator of the man and this universe .I would like to express my heartfelt gratitude to
everyone who contributed to the successful completion of this project. First and foremost, I am
deeply thankful to Dr. Faisal Tufail, whose guidance, encouragement, and insights were
invaluable throughout this project.
I am also grateful to my copartner, for his collaboration and support, which were essential in
achieving our project’s goals. Special thanks to Riphah international University Lahore for
providing the resources and environment that made this work possible.
5
Abstract
Now a day’s security is an important aspect. Technology develops day by day in the world.
Nowadays crime gang also improves their technology to carry out to cover a large area. We
know laser light goes too long distances without scattering effect. It’s additionally obvious just at
the source and occurrence point, in any case invisible. These two properties help us to develop a
modern security system, which may name a “Laser Security System.” When any person or object
crossover the laser light, automatically the buzzer starts ringing. Laser beam goes through long
distances without scattering effect and the ray is almost invisible. The paper involves the use of
ESP32, Laser light, Buzzer, LDR, PIR sensor, and a simple program. And also we use the Blynk
app which is connected to the ESP32 microcontroller. From this app, we can enable or disable
the security systems. With this equipment, we can easily set up security that makes sound or
commotion when it distinguishes any sporadic action or can be part of a much bigger security or
any other automation system which can alert the owner.
______________________________________________________________________________
Keyword: Internet of things, Security system, Laser, LDR
6
Chapter 1: Introduction
Security is a most important factor today. Technology develops day by day in the world. The
crime gang also improves their technology to perform their operation. So technology of security
should be modern with time to protect the crime works. We decide to make a security project as
our project. In this project we have used laser light to cover a large area. We know laser light
goes through long distance without scattering effect. It’s also visible only at source and incident
point, otherwise invisible. These two properties help us to build up a modern security system,
which may name as Dzlasersecuritydz. When any person or object crossover the laser line the
security alarm will ringing and also the focus light will Dzondz to focus the entrance of
unauthorized person. Presented here is a security system that uses an inexpensive laser torch
which is usually available with a key ring. The advantage of this security lock is that you can use
any laser torch or pointer that is easily available in toy shops. It employs minimal input keys and
yet is very secure. It can be used as a door lock, briefcase lock or any other application related to
an electronic locking system(Edwards & Goodrich, 2024).
7
the traditional surveying instrument method of measuring phase shifts by comparing the
incoming wavelength with the phase of the outgoing light pulse(Uleri et al., 2024).
The Laser security systems are high tech innovations that have gained popularity in home and
office security systems. These are used to be expensive solutions for security needs. Depending
on cost and fast technological advancements laser security systems becoming more adoptable.
The features and specifications of the laser security system can be had in detail from the security
system dealers who provide high end solutions based on requirement. Today, we will explore the
answer to all of these questions. In addition, (in the associated activity) you will work in the
computer lab in small groups to explore specific types of lasers and create presentations to share
our findings with the class. With the conclusion of the presentations, you should know exactly
what type of laser would be best for use in your security system design. Even further, you will
know exactly why we are using a laser based security system to invisibly detect the presence of a
thief(Liu et al., 2024).
The use of switch S2, pressing and releasing of switch S1 and supplying the laser pulses at the
right time are the security features of this circuit. Switch S2 should not be released during the
entire operation, otherwise the counter will get reset and you will not be able to open the lock.
When switch S1 is pressed, the first in-built timer of IC2 is triggered. Its output pin 5 goes high
8
for four seconds. LED1 glows and transistor T3 conducts. During this time, the collector of T3
becomes low, which in turn pulls the clock enable pin (pin 13) of IC1 to low state. This enables
the counter (IC1) to count. During this time, five laser pulses are applied (by you) at photo
sensor T1. These signal pulses go to clock pin 14. LED4 glows and T2 conducts at the fifth
pulse. This triggers the in-built second timer of IC2. Its output pin 9 goes high for two seconds.
The high state is indicated by the glowing of LED2. When LED2 goes off, you press switch S1
and release it (Dziendziel, 2024).
The first timer is triggered again and its output is high for four seconds. During this time, you
send another five pulses of laser beam towards the sensor. At the fifthpulse, LED3 glows and
transistor T4 conducts. This action triggers IC3 and its output pin 3 goes high for ten seconds.
That is, the lock opens for ten seconds. The lock driver circuit is connected to output pin 3 of
IC3. The circuit is powered off a 5V DC supply. Normally the electric lock or electric strike
works off a 12V DC. To make the circuit simple, the lock driver section is not shown here.while
pressing switches S1 and S2 simultaneously, point the laser torch toward the photo transistor
sensorT1andpress on/off button of the laser torch five times within four seconds. Release switch
S1 while pressing switch S2. Wait for two seconds till LED2 goes off. Keeping S2 pressed, press
S1 and release it, press on/off button of laser torch five times again. The lock will open for ten
seconds and then close automatically. The lock can also be opened from the inside (for ten
seconds) by pressing switch S3(Liu et al., 2024).
9
Chapter 2: Literature review
In a paper titled “LASER Based Security System Using Wireless Sensor Network and
GPRS/GSM Technology for Inland Aquaculture” by (Chandrappa et al., 2023),So in this paper,
it will shows the if don’t two types of block diagrams first the sensor node and second ode in
sensor node which uses the microcontroller as the main microcontroller and the power supply
laser and LDR array so whenever any human comes in the middle of the LDR laser array then it
will send a signal to the mainmicrocontroller are do you know board then I do know will be
connected with the trance receiver module this modulus send data to the GPS or GPRS gateway
blocks here is a receiver views same model as a receiver so it will send a signal to the main
controller board here also use the ordinance for the main controller board Ar- duino is the
working on the at mega 38p IC it is at male cheawith the GSM and GPRS module it will send the
trigger to the server and it will on the alarm whenever the any person detected in the middle of
the LDR and laser Array.
10
uses Wi-Fi modem to integrate the our system with Internet and that will help us to send the alert
message to the register email address.
In a paper titled “Automation Security System with Laser Lights Alarm on Web Pages and
Mobile Apps by(Oliveira et al., 2016), In this paper the automation security system with
interfaces with the laser security system and sends the alert on a web page on the mobile app
simultaneously for that here using raspberry Pi 2 version as a main controller board it’s which is
integrated with the laser security system and automation system are also it is using the pillar
sensor light way and alarms for the different purposes so whenever any person will introduce the
laser the signal provided to they buy and that I will send the data to the server and mobile
application as well as also is used if the human is detected the lights alarm will be on and send
data to the web page and server. It is a very advance Security System that can be used as a real-
time implementation of the valve required to micro control as a very powerful micro- controller
that uses an OS that is programmed in python programming.
In a paper titled “ LASER LIGHT SECURITY SYSTEM USING ARDUINO WITH
ALARAM” by (Vanteru, 2023), Security Light using Arduino with alarm is low cost and
effective for home and small office security.The system uses an Arduino microcontroller and
various sensors to detect motion and light in the surrounding environment. When motion is
detected, the system triggers an alarm to notify users of a possible intrusion. In addition, the
system has the ability to turn the lights on and off according to the light level, which may distract
the intruders. All systems can be easily configured and adjusted to meet the user’s specific needs.
This project provides a cost-effective and practical way to increase security in a small space.
In a paper titled “Low Cost Laser Light Security System in Smart Home” by (Rai et al., 2019),
the concept of smart homes has gained popularity due to the ease of automation and the ability to
remotely control various devices. However, this increased connectivity also raises concerns
about security and privacy. This paper proposes a low-cost laser light security system that can be
easily integrated into a smart home. The system uses a laser and a light sensor to detect any
unauthorized entry into the home. The laser emits a beam of light, and when an intruder crosses
the beam, the light sensor detects the interruption and triggers an alarm. The proposed system is
simple to install and can be controlled through a mobile application. The system is designed to
be cost effective and can be easily implemented in households with limited budgets. The results
11
show that the proposed system is highly effective in detecting intruders and can be a valuable
addition to a smart home security system.
Chapter 3: Methodology
Block diagram of the proposed system is presented in figure 1.
The circuit functions by utilizing a voltage divider circuit. As the light intensity on the Light
Dependent Resistor (LDR) rises, its resistance decreases. Consequently, when the LDR is
exposed to laser light, its resistance significantly diminishes. This action results in the 9-volt
12
supply connecting to the ground through a 10K resistor,causing the transistor’s base to receive a
low value, indicating the transistor is in the OFF state. Conversely, when the light intensity
diminishes or the laser is interrupted, the LDR’s resistance increases. This elevated resistance
imparts a high value to the transistor’s base, prompting it to turn on. Consequently, the buzzer is
activated. This operational sequence forms the foundation of our security system employing a
laser.
The schematic representation of the proposed system isillustrated in Fig. 2
The circuit diagram for an ESP32 CAM laser security system using a laser module, LDR
module, UART (TTL), and Telegram integration would involve connecting the components in a
specific configuration. Here’s a description of the ESP32 CAM is a microcontroller board with
built-in Wi-Fi and a camera module. It acts as the main controller for the security system. The
laser module emits a laser beam, which is used to detect motion or intrusion. The LDR (Light
Dependent Resistor) module consists of an LDR that senses the laser beam’s interruption and
changes its resistance accordingly. The UART (Universal Asynchronous Receiver/Transmitter)
module is used for serial communication between the ESP32 CAM and other devices. It converts
the data between parallel and serial formats. Telegram is a messaging platform that allows you to
send and receive messages over the internet.
It provides an API for integration with other systems. Connect the VCC and GND pins of the
ESP32 CAM to a suitable power source. Connect the laser module’s positive terminal (VCC) to
a suitable power source, and connect the negative terminal (GND) to the GND pin of the ESP32
CAM. Connect one end of the LDR module to the A0 analog input pin of the ESP32 CAM, and
13
connect the other end to the GND pin. Connect the UART module’s TX (transmit) pin to the RX
(receive) pin of the ESP32 CAM, and connect the RX pin to the TX pin of the ESP32 CAM.
Connect the UART module’s VCC and GND pins to a suitable power source. Finally, connect
the ESP32 CAM to the internet using Wi-Fi. To integrate with Telegram, you would need to set
up a Telegram bot and obtain the relevant API credentials. It can then use the ESP32 CAM’s
programming capabilities to send and receive messages via the Telegram API, providing
notifications or alerts based on the security system’s status.
Chapter 4: Results
A straightforward prototype has been developed to ensure the safety and security of a premises,
comprising components such as ESP32CAM, LM393 LDR Module, Laser Module, and UART
TTL, with power supplied through a DC adapter. The hardware configuration involves the
emission of a laser line by the emitter, which is then detected by the LDR. The primary circuit
setup allows for the extension of the laser line using small mirrors, as they effectively reflect the
laser. In the event of an intrusion, the laser circuit is disrupted, triggering a loud buzzer almost
instantaneously.
14
A notification is promptly dispatched to the Telegram Messenger App. Simultaneously, a
designated surveillance camera captures an image of the intruder and transmits it to the app for
evidential purposes. When the object is replaced by anyone,the information is passed to the
telegram and instantly the REd LED will be ON and the buzzer gets buzzed. And also
notification is send to owner through the server.
15
Chapter 5: Discussion
The laser security system described in this project serves as an efficient and technologically
advanced approach to enhancing security in both residential and commercial settings. Leveraging
the unique properties of laser lightnsuch as its long-distance travel with minimal scattering and
invisibility except at the source and target points this system offers discreet and robust intrusion
detection. The integration of components such as ESP32, Light Dependent Resistor (LDR)
modules, PIR sensors, and the Blynk app for remote control provides an accessible, cost-
effective, and responsive security solution.
One of the most significant advantages of this system is its ability to detect intrusions almost
instantaneously by responding to any interruption of the laser beam. This immediate detection is
achieved by configuring the laser to cover entry points or specific areas, and upon detecting any
obstruction, the system triggers an alarm. The alarm activation is accompanied by a notification
sent to the owner via the Blynk app, which connects with the ESP32 microcontroller’s Wi-Fi
capabilities. This functionality allows for real-time alerts, empowering users to respond quickly
to potential security breaches. Such a feature is valuable not only in home security but also for
securing commercial spaces that might not have constant surveillance.
In previous paper discussed the technological choices in this project reflect current trends in
Internet of Things (IoT)-based security systems, where centralized control and connectivity are
prioritized for user convenience. The ESP32 microcontroller acts as a central hub for this
security system, coordinating signals from the LDR module, which detects changes in light
intensity, and the PIR sensor, which identifies motion. The Blynk app integration allows users to
enable or disable the system remotely, thus making this security system highly customizable to
individual needs. This level of connectivity supports a more interactive and accessible security
16
experience compared to traditional setups, where security might rely solely on physical presence
or manual adjustments (Vanteru, 2023).
Despite these advantages, the system has certain limitations that may affect its performance in
specific environments. For instance, laser beams, although stable under normal conditions, can
be impacted by environmental factors such as heavy rain, dust accumulation on sensors, or fog,
which could result in interruptions or false alarms. Additionally, the system’s dependence on a
stable Wi-Fi connection through the ESP32 module may introduce vulnerabilities if the network
becomes compromised or unstable. In previous paper addressing these limitations requires
considering backup communication protocols, perhaps through mobile data or local storage
options, ensuring system continuity even when connectivity is lost. Including adaptive
algorithms to adjust sensor sensitivity based on environmental changes could also reduce false
positives (Dziendziel, 2024).
A comparison with traditional security systems highlights the laser security system’s advantages
in terms of cost-effectiveness, ease of setup, and flexibility. While many security systems require
extensive wiring, complex software, or costly installation, this laser-based approach minimizes
costs by using readily available components. Moreover, the design is adaptable; the laser line can
be extended using mirrors to cover irregularly shaped areas or broader spaces, which enhances
its suitability for various locations. This flexibility makes the laser security system a compelling
choice for households and small businesses, providing reliable detection without the higher costs
typically associated with professional security installations.
The growing demand for smart homes and integrated IoT systems further supports the relevance
of this project. The laser security system aligns with the concept of remote-controlled and
automated home environments, where users can monitor, control, and receive alerts from their
security devices via mobile apps. The ability to incorporate features like video monitoring
through ESP32 CAM modules, which can send real-time footage to the app, could serve as a
valuable enhancement. In previous paper this would not only verify alerts but also record
potential intrusions, adding a layer of evidence for security incidents. Additionally,
implementing two-factor authentication or encrypted communication protocols would bolster the
security of the Blynk app and the ESP32 connection, protecting the system from cyber threats
(Rai et al., 2019).
17
Looking forward, this laser security system could benefit from the addition of artificial
intelligence (AI) or machine learning (ML) to improve detection accuracy and reduce false
alarms. For example, ML algorithms could be trained to differentiate between typical disruptions
(such as small animals or falling leaves) and potential intruders, thus enhancing the system’s
precision and reliability. The system could also integrate with a broader network of IoT devices,
such as smart lights or sirens, to respond to security breaches by activating various deterrent
measures. With AI and IoT integration, the system could further offer predictive analytics,
alerting users about unusual patterns or high-risk times based on historical data.
The laser security system has significant potential as a foundational component of modern
security infrastructures, meeting the growing demand for efficient, tech-enabled home and
business protection solutions.
18
Chapter 6: CONCLUSIONS
The laser security system is a robust defense mechanism against criminal activities, ensuring
security in our daily lives. People increasingly opt for this dependable solution, installing it for
enhanced safety. Electronic security measures find application in both residential and critical
work settings, providing a layer of protection against potential threats. This technology presents
an excellent opportunity to conserve manpower and reduce electricity consumption. The “Laser
Security System” plays a pivotal role as a crucial support system, significantly lowering the risks
associated with robbery, theft, and crime. This proactive approach enhances the safety of
financial assets, offering comprehensive protection. Integrating the Laser and LDR module with
the ESP32 CAM system elevates sensitivity and broadens the operational range. The system
detects light emitted by the laser, falling onto the LDR connected within the circuit.Any
disruption in the light beam prompts a response, making it well-suited for surveillance,industrial
applications, and smart environments.
19
Chapter 7: References
Chandrappa, S., Chandra Shekar, P., Chaya, P., Dharmanna, L., &Guruprasad, M. S. (2023).
Chaugule, S., Chaugule, S., Dhede, V. M., Rahane Sunil, L., &Satpute, R. S. (n.d.). LDR &IoT
Daimon, S., Tsunekawa, K., Takeuchi, R., Sagawa, T., Yamamoto, N., &Saitoh, E. (2024).
63(3), 032003.
Dziendziel, A. (2024). Estimation of the Values of Electrical Shock Currents during Live-Line
4276.
Edwards, F. L., & Goodrich, D. C. (2024). Introduction to transportation security. CRC Press.
https://books.google.com/books?
hl=en&lr=&id=LATmEAAAQBAJ&oi=fnd&pg=PA1986&dq=security+system+introdu
ction&ots=ab1Vmj-1Dc&sig=dg6_Gjl9P9nKV_3N9YjWi7moQJo
20
Liu, Y., Qiu, Z., Ji, X., Bancora, A., Lihachev, G., Riemensberger, J., Wang, R. N., Voloshin, A.,
Photonics, 1–7.
Oliveira, L. B., Paulino, N., Oliveira, J. P., Santos-Tavares, R., Pereira, N., & Goes, J. (2016).
Rai, A., Rai, M., Jogi, N., Rai, B., Rai, S., &Rasaily, D. (2019). Low cost laser light security
https://ieeexplore.ieee.org/abstract/document/9008141/
Uleri, A., Farré, A., Izquierdo, P., Angerri, O., Kanashiro, A., Balaña, J., Gauhar, V., Castellani,
D., Sanchez-Martin, F., &Monga, M. (2024). Thulium fiber laser versus holmium:
European Urology.
https://www.sciencedirect.com/science/article/pii/S0302283824000125
Vanteru, M. K. (2023). Fingerprint Laser Security Alarm. International Journal for Innovative
abstract_id=4802260
21